New Mexico 8.101 Reckless Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(B))
New Mexico 8.95 Obtaining Information by Computer-Injurious to United States or Advantageous to Foreign Nation (18 U.S.C. Sec. 1030(a)(1))
New Mexico 8.96 Obtaining Information by Computer-From Financial Institution or Government.. . . . . . . Computer (18 U.S.C. Sec. 1030(a)(2)(A) and (B))
New Mexico 8.98 Unlawfully Accessing Nonpublic Computer Used by the Government xxx (18 U.S.C. Sec. 1030(a)(3))
New Mexico 8.99 Computer Fraud-Use of Protected Computer (18 U.S.C. Sec. 1030(a)(4))
Lack of Form Petition
Addendum To Apartment Lease regarding Smoke Detector
Shrink Wrap End User Software License Agreement
Corporate Resolution for Signing Authority
Sample Stock Purchase Agreement between Allegheny Energy, Inc., Energy Corp. of America and Eastern Systems Corporation
Report of Application and/or Order Authorizing Interception of Communications (Federal)
Motion for Placement Prior to Pre-Placement Investigation
Agreement with Performing Artist to give a Concert
Plan of Liquidation
Sample Letter for Attempt to Collect Debt before Acceleration
Arkansas 8.134 Fraud-False Statement on Immigration Document (18 U.S.C. Sec. 1546(a))
California 8.134 Fraud-False Statement on Immigration Document (18 U.S.C. Sec. 1546(a))
Colorado 8.134 Fraud-False Statement on Immigration Document (18 U.S.C. Sec. 1546(a))
Delaware 8.134 Fraud-False Statement on Immigration Document (18 U.S.C. Sec. 1546(a))
Connecticut 8.134 Fraud-False Statement on Immigration Document (18 U.S.C. Sec. 1546(a))